$ 0 0 Different attacks generate different packets, you'll have to analyze each of them and create a software to detect it.